Sciweavers

25 search results - page 4 / 5
» Understanding Challenges of Information Security Culture: A ...
Sort
View
JCDL
2006
ACM
116views Education» more  JCDL 2006»
13 years 11 months ago
Enabling exploration: travelers in the middle east archive
In this paper, we describe the Travelers in the Middle East Archive (TIMEA), a digital archive focused on Western explorations in the Middle East between the 18th and early 20th c...
Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck ...
CHI
2003
ACM
14 years 5 months ago
Sense and sensibility: evaluation and interactive art
HCI evaluation methods are useful for improving the design of interactive systems, yet they may be rejected by nontraditional technology disciplines such as media art. We have dev...
Gerd Andersson, Kristina Höök, Phoebe Se...
SOUPS
2010
ACM
13 years 9 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
SIGSOFT
2002
ACM
14 years 6 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
EGOV
2007
Springer
13 years 11 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...